Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,860 Article Results

Does empathy and awareness of bullying affect the performance of Moroccan students in PISA?

10.11591/ijict.v14i3.pp860-867
Ilyas Tammouch , Abdelamine Elouafi , Soumaya Nouna
Socioemotional skills, such as empathy and bullying awareness, play a pivotal role in shaping students' personal and academic development. These skills are increasingly recognized as critical factors influencing educational outcomes, particularly in addressing challenges like bullying that can hinder learning. This study examines the impact of empathy and bullying awareness on the academic performance of Moroccan students, using data from the 2018 Programme for International Student Assessment (PISA). To ensure robust causal inference in high-dimensional data, the double/debiased machine learning (DML) technique is employed. The findings reveal that higher levels of empathy and awareness of bullying significantly enhance performance across reading, mathematics, and science, with the most notable improvements observed in reading. These results remain consistent across various demographic and socioeconomic groups, highlighting their robustness. The study underscores the importance of integrating socioemotional learning into educational practices to foster academic success and create supportive school environments. By contributing to the growing evidence on non-cognitive skills in education, this research offers valuable insights for educators and policymakers seeking to improve student outcomes.
Volume: 14
Issue: 3
Page: 860-867
Publish at: 2025-12-01

State space controller of SLCC and design analysis with MPPT approaches

10.11591/ijict.v14i3.pp791-801
Jeyaprakash Natarajan , Nivethitha Devi Manoharan , Mohanasanthosh Murugan , Karnati Venkata Lokeshwar Reddy , Thirumalaivasal Devanathan Sudhakar
Power systems with standalone properties like remote unit telecommunication network requires high negative DC supply voltage. In such remote places, solar photovoltaic (PV) are used to generate power. Maximum power point tracking techniques (MPPT) gives unregulated voltage from solar panel. This unregulated voltage is converted into regulated voltage by providing proper pulse width modulation (PWM) signal to self-lift cuk converter (SLCC). In comparison with classic cuk converter, SLCC reduces load voltage and load current ripples. This paper focuses on state space controller design and implementation of SLCC used in MPPT based PV system. The switching pulse of SLCC can be generated by perturb and observe (P&O), incremental conductance (IC) and also using fuzzy control. The simulation of SLCC has been performed using MATLAB/Simulink and its specifications in time domain has been compared.
Volume: 14
Issue: 3
Page: 791-801
Publish at: 2025-12-01

Comparative analysis of u-net architectures and variants for hand gesture segmentation in parkinson’s patients

10.11591/ijict.v14i3.pp972-982
Avadhoot Ramgonda Telepatil , Jayashree Sathyanarayana Vaddin
U-Net is a well-known method for image segmentation, and has proven effective for a variety of segmentation challenges. A deep learning architecture for segmenting hand gestures in parkinson’s disease is explored in this paper. We prepared and compared four custom models: a simple U-Net, a three-layer U-Net, an auto encoder-decoder architecture, and a U-Net with dense skip pathways, using a custom dataset of 1,000 hand gesture images and their corresponding masks. Our primary goal was to achieve accurate segmentation of parkinsonian hand gestures, which is crucial for automated diagnosis and monitoring in healthcare. Using metrics including accuracy, precision, recall, intersection over union (IoU), and dice score, we demonstrated that our architectures were effective in delineating hand gestures under different conditions. We also compared the performance of our custom models against pretrained deep learning architectures such as ResNet and VGGNet. Our findings indicate that the custom models effectively address the segmentation task, showcasing promising potential for practical applications in medical diagnostics and healthcare. This work highlights the versatility of our architectures in tackling the unique segmentation challenges associated with parkinson’s disease research and clinical practice.
Volume: 14
Issue: 3
Page: 972-982
Publish at: 2025-12-01

Multilingual hate speech detection using deep learning

10.11591/ijict.v14i3.pp1015-1023
Vincent Vincent , Amalia Zahra
The rise of social media has enabled public expression but also fueled the spread of hate speech, contributing to social tensions and potential violence. Natural language processing (NLP), particularly text classification, has become essential for detecting hate speech. This study develops a hate speech detection model on Twitter using FastText with bidirectional long short-term memory (Bi-LSTM) and explores multilingual bidirectional encoder representations from transformers (M-BERT) for handling diverse languages. Data augmentation techniques-including easy data augmentation (EDA) methods, back translation, and generative adversarial networks (GANs)-are employed to enhance classification, especially for imbalanced datasets. Results show that data augmentation significantly boosts performance. The highest F1-scores are achieved by random insertion for Indonesian (F1-score: 0.889, Accuracy: 0.879), synonym replacement for English (F1-score: 0.872, Accuracy: 0.831), and random deletion for German (F1-score: 0.853, Accuracy: 0.830) with the FastText + Bi-LSTM model. The M-BERT model performs best with random deletion for Indonesian (F1-score: 0.898, Accuracy: 0.880), random swap for English (F1 score: 0.870, Accuracy: 0.866), and random deletion for German (F1-score: 0.662, Accuracy: 0.858). These findings underscore that data augmentation effectiveness varies by language and model. This research supports efforts to mitigate hate speech’s impact on social media by advancing multilingual detection capabilities.
Volume: 14
Issue: 3
Page: 1015-1023
Publish at: 2025-12-01

Unit commitment problem solved with adaptive particle swarm optimization

10.11591/ijict.v14i3.pp783-790
Ramesh Babu Muthu , Venkatesh Kumar Chandrasekaran , Bharathraj Munusamy , Dashagireevan Sankaranarayanan
This article presents an innovative approach that solves the problem of generation scheduling by supplying all possible operating states for generating units for the given time schedule over the day. The scheduling variables are set up to code the load demand as an integer each day. The proposed adaptive particle swarm optimization (APSO) technique is used to solve the generation scheduling issue by a method of optimization considering production as well as transitory costs. The system and generator constraints are considered when solving the problem, which includes minimum and maximum uptime and downtime as well as the amount of energy produced by each producing unit (like capacity reserves). This paper describes the suggested algorithm that can be applied for unit commitment problems with wind and heat units. Test systems with 26 and 10 units are used to validate the suggested algorithm.
Volume: 14
Issue: 3
Page: 783-790
Publish at: 2025-12-01

Quantifying the severity of cyber attack patterns using complex networks

10.11591/ijict.v14i3.pp1179-1188
Ahmed Salih Hasan , Yasir F. Mohammed , Basim Mahmood
This work quantifies the severity and likelihood of cyberattacks using complex network modelling. A dataset from common attack pattern enumerations and classifications (CAPEC) is collected and formalized as nodes and edges aiming at creating a network model. In this model, each attack pattern is represented as a node, and an edge is created between two nodes when there is a relation between them. The dataset includes 559 attack patterns and 1921 relations among them. Network metrics are used to perform the analysis on the network level and node level. Moreover, a rank of the CAPECs based on a complex network perspective is generated. This rank is compared with the CAPEC ranking system and deeply discussed based on cybersecurity perspective. The findings show interesting facts about the likelihood and severity of attacks. It is found that the network perspective should be given attention by the CAPEC ranking system. Finally, the results of this work can be of high interest to security architects.
Volume: 14
Issue: 3
Page: 1179-1188
Publish at: 2025-12-01

Empowering low-resource languages: a machine learning approach to Tamil sentiment classification

10.11591/ijict.v14i3.pp941-949
Saleem Raja Abdul Samad , Pradeepa Ganesan , Justin Rajasekaran , Madhubala Radhakrishnan , Peerbasha Shebbeer Basha , Varalakshmi Kuppusamy
Sentiment analysis is essential for deciphering public opinion, guiding decisions, and refining marketing strategies. It plays a crucial role in monitoring public sentiment, fostering customer engagement, and enhancing relationships with businesses' target audiences by analyzing emotional tones and attitudes in vast textual data. Sentiment analysis is extremely limited, particularly for languages like Tamil, due to limited application in diverse linguistic contexts with fewer resources. Given its global impact and linguistic diversity, addressing this gap is crucial for a more nuanced understanding of sentiments in India. In the context of Tamil, the need for sentiment analysis models is particularly crucial due to its status as one of the classical languages spoken by millions. The cultural, social, and historical nuances embedded in Tamil language usage require tailored sentiment analysis approaches that can capture the subtleties of sentiment expression. This paper introduces a novel method that assesses the performance of various text embedding methods in conjunction with a range of machine learning (ML) algorithms to enhance sentiment classification for Tamil text, with a specific focus on lyrics. Experiments notably emphasize FastText word embedding as the most effective method, showcasing superior results with a remarkable 78% accuracy when coupled with the support vector classification (SVC) model.
Volume: 14
Issue: 3
Page: 941-949
Publish at: 2025-12-01

Shellcode classification analysis with binary classification-based machine learning

10.11591/ijict.v14i3.pp923-932
Jaka Naufal Semendawai , Deris Stiawan , Iwan Pahendra Anto Saputra , Mohamed Shenify , Rahmat Budiarto
The internet enables people to connect through their devices. While it offers numerous benefits, it also has adverse effects. A prime example is malware, which can damage or even destroy a device or harm its users, highlighting the importance of cyber security. Various methods can be employed to prevent or detect malware, including machine learning techniques. The experiments are based on training and testing data from the UNSW_NB15 dataset. K-nearest neighbor (KNN), decision tree, and Naïve Bayes classifiers determine whether a record in the test data represents a Shellcode attack or a non-Shellcode attack. The KNN, decision tree, and Naïve Bayes classifiers reached accuracy rates of 96.26%, 97.19%, and 57.57%, respectively. This study's findings aim to offer valuable insights into the application of machine learning to detect or classify malware and other forms of cyberattacks.
Volume: 14
Issue: 3
Page: 923-932
Publish at: 2025-12-01

Chatbot for virtual medical assistance

10.11591/ijict.v14i3.pp914-922
Aravalli Sainath Chaithanya , Sampangi Lahari Vishista , Adepu MadhuSri
A healthy population is vital for societal prosperity and happiness. Amidst busy lifestyles and the challenges posed by the COVID-19 pandemic, individuals often neglect their health needs. To address this, we introduce a novel approach utilizing a chatbot for virtual medical assistance. Tailored for individuals confined indoors or hesitant to visit hospitals for minor ailments, our chatbot offers personalized medical support by diagnosing ailments based on user-reported symptoms and engaging in interactive conversations. Leveraging a robust dataset containing 132 symptoms, 41 diseases, and corresponding medications, our chatbot employs a systematic approach for symptom refinement, enhancing diagnostic precision. Upon identifying a disease, the chatbot promptly suggests basic medications tailored to the specific ailment. Furthermore, our system integrates user demographics to evaluate medication history and current state, allowing for personalized medication recommendations based on individual needs. Through extensive testing and validation, we demonstrate the effectiveness of our chatbot in accurately predicting ailments and providing timely treatment advice. Our study introduces a novel paradigm for medicine recommendation and disease prediction, with the potential to enhance healthcare accessibility and effectiveness.
Volume: 14
Issue: 3
Page: 914-922
Publish at: 2025-12-01

Soil moisture prototype soil moisture sensor YL-69 for Gaharu (Aquilaria malaccensis) tree planting media

10.11591/ijict.v14i3.pp1163-1171
Rikie Kartadie , Muhammad Agung Nugroho , Adiyuda Prayitna , Adi Kusjani , Ardeana Galih Mardika
Soil moisture, defined as the amount of water present in the spaces between soil particles, plays a critical role in plant growth. Excessive soil moisture can lead to issues such as root rot, deviating from the ideal conditions required for root absorption. To address this, we developed a prototype tool using the YL-69 soil moisture sensor to monitor and control the soil moisture levels in Agarwood/Gaharu tree planting media. The prototype was designed to activate a water pump when soil moisture exceeded 80%, ensuring optimal humidity for plant growth. Once the moisture level dropped below 80%, the pump was deactivated to prevent overwatering. The YL-69 sensor demonstrated an accuracy of 88.76% under controlled conditions. This study highlights the potential of using low-cost sensors for automated soil moisture management in small-scale Gaharu cultivation.
Volume: 14
Issue: 3
Page: 1163-1171
Publish at: 2025-12-01

A survey on ransomware detection using AI models

10.11591/ijict.v14i3.pp1085-1094
Goteti Badrinath , Arpita Gupta
Data centers and cloud environments are compromised as they are at great risk from ransomware attacks, which attack data integrity and security. Through this survey, we explore how AI, especially machine learning and deep learning (DL), is being used to improve ransomware detection capabilities. It classifies ransomware types, highlights active groups such as Akira, and evaluates new DL techniques effective at real-time data analysis and encryption handling. Feature extraction, selection methods, and essential parameters for effective detection, including accuracy, precision, recall, F1-score and receiver operating characteristic (ROC) curve, are identified. The findings point to the state of the art and the state of the art in AI based ransomware detection and underscore the need for robust, real-time models and collaborative research. The statistical and graphical analyses help researchers and practitioners understand existing trends and directions for future development of efficient ransomware detection systems to strengthen cybersecurity in data centers and cloud infrastructures.
Volume: 14
Issue: 3
Page: 1085-1094
Publish at: 2025-12-01

Solar-powered boost-fly back converter for efficient warehouse monitoring with flack droid

10.11591/ijict.v14i3.pp802-810
S. Sivajothi Kavitha , D. Usha , V. Jamuna
Warehouses serve as essential infrastructure for storing a wide array of goods and are utilized by various entities. Implementing a sophisticated warehouse management system (WMS) represents a pinnacle of technological advancement. Effective warehouse maintenance is paramount, benefiting both consumers and producers alike. Typically, warehouses store items such as medicine, chemicals, food, and electronics, requiring controlled conditions of temperature and humidity. Monitoring these factors is essential to comply with regulations and maintain internal quality standards. This paper focuses on optimizing warehouse management to meet customer demands and streamline processes for packaging and production teams. Additionally, it proposes the integration of droid technology within warehouses to monitor the parameters and mitigate fire hazards, thereby enhancing the efficiency and safety of goods storage. This proactive approach not only ensures the integrity of stored products but also contributes to cost-saving measures within the warehouse. This paper introduces an innovative method to achieve a substantial increase in voltage output in a DC-DC converter while avoiding the need for excessively high duty ratios. The converter’s operation is governed by a single pulse width modulation (PWM) signal, employing a fractional-order proportional-integral-derivative controller (FOPID) for regulating the power switch. By merging boost-forward-fly back (BFF) converter topologies, the design achieves a remarkable voltage gain. Moreover, the converter efficiently recycles energy stored in the leakage inductance of the coupled inductor, thereby reducing voltage stress and minimizing power losses and thus enhancing overall converter efficiency.
Volume: 14
Issue: 3
Page: 802-810
Publish at: 2025-12-01

Revolutionizing human activity recognition with prophet algorithm and deep learning

10.11591/ijict.v14i3.pp1108-1118
Jaykumar S. Dhage , Avinash K. Gulve
Various industries, such as healthcare and surveillance, depend heavily on the ability to recognize human activity. The “human activity recognition (HAR) using smartphones data set” can be found in the UCI online repository and includes accelerometer and gyroscope readings recorded during a variety of human activities. The accelerometer and gyroscope signals are also subjected to a band-pass filter to eliminate unwanted frequencies and background noise. This method effectively decreases the dimensionality of the feature space while improving the model's accuracy and efficiency. “Convolutional neural networks (CNNs)” and “long shortterm memory (LSTM)” networks are combined to create pyramidal dilated convolutional memory network (PDCMN), which is the final proposal. Results from experiments demonstrate the effectiveness and reliability of the suggested method, demonstrating its potential for precise and effective HAR in actuality schemes.
Volume: 14
Issue: 3
Page: 1108-1118
Publish at: 2025-12-01

Modeling chemical kinetics of geopolymers using physics informed neural network

10.11591/ijict.v14i3.pp822-829
Blesso Abraham , Thirumalaivasal Devanathan Sudhakar
Using a physics informed neural network for the analysis of geopolymers as an alternate material for cement can be a viable approach, as neural networks are capable of modeling complex, nonlinear relationships in data, which can be beneficial for representing the dynamics of chemical properties. If you have a substantial amount of theoretical data, a neural network can learn patterns and relationships in the data, even when the underlying system dynamics are not well-defined or are difficult to model analytically. A welltrained neural network can generalize from the training data to make predictions for unseen scenarios, which can be useful for real-time analysis of the material.
Volume: 14
Issue: 3
Page: 822-829
Publish at: 2025-12-01

Scaling of Facebook architecture and technology stack with heavy workload: past, present and future

10.11591/ijict.v14i3.pp772-782
Tole Sutikno , Laksana Talenta Ahmad
Leading social media Facebook has improved its architecture to meet user needs. Facebook has improved its systems to handle millions of users with heavy workloads and large datasets using innovative architectural solutions and adaptive strategies. The study examines Facebook’s architectural and technological advances in heavy workload and big data. To understand how Facebook scaled with a growing user base and data volume, history and system architecture will be examined. It will also examine how cloud storage and high-performance computing optimize resource utilization and maintain performance during peak user activity. Facebook is managing big data and heavy workloads with new technologies like the hybrid communication model that uses PULL and PUSH strategies for real-time messaging. Facebook switched from HBase to MyRocks for message storage to improve performance as data grew. Architectural scaling and technology stack research must prioritize data storage innovations and optimized communication protocols to handle heavy workloads and big data. The messenger Sync protocol reduces network congestion and improves synchronous communication, reducing resource consumption and maintaining performance under high load. High-performance computing (HPC) and cloud storage should be studied together to support complex compute workflows. This convergence may improve large-scale application infrastructures and encourage interdisciplinary collaboration for scalable and resilient systems.
Volume: 14
Issue: 3
Page: 772-782
Publish at: 2025-12-01
Show 2 of 1858

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration